AUTHOR ARCHIVES

Rebecca Greenfield

Results 41-50 of 178

Do You Need to Meet Everyone You Hire?

March 12, 2013 After a pile of backlash over her work-from-home ban, Marissa Mayer, the Yahoo CEO who can do no right, is now getting flack for trying to get the best people to work at her fledgling company, which might not be as ridiculous as it sounds. Just ask Sheryl Sandberg. At...

Commentary: The Ban on Cellphone Unlocking Has Gone Too Far

March 11, 2013 FROM NEXTGOV arrow In one of the industry's first effort to allay customer concerns since regulations went into effect six weeks ago that make it illegal to unlock your cellphone, AT&T is telling you to relax, they'll unlock it for you. As long as you do exactly what they say. Indeed, the newly...

How You Can Stop Webcam Hackers from Watching You

March 11, 2013 FROM NEXTGOV arrow There is one foolproof way to avoid an increasingly terrifying group of perverted cyberspies who are hijacking (mostly) women's computer cameras: Buy a new computer that has a light that goes on whenever your webcam is in use, whether you know it or not. [Update: Tape also works.] Ars Technica's...

Not All Work-from-Home Bans Are Created Equal

March 6, 2013 FROM NEXTGOV arrow So Best Buy announced this week that it, too, will start making its workers come in and — well, well — nobody is calling new white-male CEO Hubert Joly a bad feminist yet. What gives? When Yahoo CEO Marissa Mayer demanded last week that her workers actually come into work,...

Coolest Thing About Learning to Code Is Getting a Job

February 27, 2013 FROM NEXTGOV arrow In an attempt to get more schools to offer programming classes, Code.org has released a promotional video filled with celebrities and "celebrities" that basically says: learn code and you too can work in a hip Silicon Valley office. About three minutes into the video, Facebook CEO Mark Zuckerberg explains how...

You Will Be Warned: ISPs Roll Out Their Anti-Piracy Alert Systems

February 27, 2013 FROM NEXTGOV arrow After some delays, the movie industry's home-brewed system to fight Internet pirates has finally arrived, and depending on their internet service provider, pirates may not have all that much to fear. In light of the government's inability to pass legislation like SOPA and PIPA the Motion Picture Associate of America...

How to Avoid Getting Spear-Phished by China's Hackers Who Cracked Apple

February 20, 2013 FROM NEXTGOV arrow The tidal wave of Chinese hack attacks on the U.S. in recent weeks, from The New York Times and the Defense Department to Facebook and now even Apple, have one increasingly common and sophisticated type of malware trick in common: "spear-phishing." The tech giants seem to be the victim of...

Is the Facebook Hack Part of a Bigger Spy Threat?

February 19, 2013 FROM NEXTGOV arrow In the latest admission from a major company that it had been hacked, Facebook announced in a blog post on Friday afternoon that its "systems had been targeted in a sophisticated attack" and that "Facebook was not alone," which immediately raised the cyber-espionage question of the moment: Was China behind...

Why America Is Losing the War Against China's Hacker Spies

February 15, 2013 FROM NEXTGOV arrow Forget The New York Times and The Wall Street Journal. Chinese hackers are on a digital espionage campaign targeting a vast array of pretty much any major American organization "with intellectual property to protect," and now that there's a rare human side to combatting the malware attacks, we know there's...

Why Google Pays Apple $1 Billion a Year

February 13, 2013 FROM NEXTGOV arrow Google is expected to pay an estimated $1 billion to Apple in 2014 to keep its search engine as the default on iOS devices because, well, Google makes a huge portion of its mobile revenue from iPhones and iPads — enough to make rivalries disappear. Last year, Google paid $417...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.